vulnerability

Amazon Linux AMI 2: CVE-2021-36374: Security patch for ant (ALAS-2022-1880)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
07/14/2021
Added
12/07/2022
Modified
12/07/2022

Description

When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

Solution(s)

amazon-linux-ami-2-upgrade-antamazon-linux-ami-2-upgrade-ant-antlramazon-linux-ami-2-upgrade-ant-apache-bcelamazon-linux-ami-2-upgrade-ant-apache-bsfamazon-linux-ami-2-upgrade-ant-apache-log4jamazon-linux-ami-2-upgrade-ant-apache-oroamazon-linux-ami-2-upgrade-ant-apache-regexpamazon-linux-ami-2-upgrade-ant-apache-resolveramazon-linux-ami-2-upgrade-ant-apache-xalan2amazon-linux-ami-2-upgrade-ant-commons-loggingamazon-linux-ami-2-upgrade-ant-commons-netamazon-linux-ami-2-upgrade-ant-javadocamazon-linux-ami-2-upgrade-ant-javamailamazon-linux-ami-2-upgrade-ant-jdependamazon-linux-ami-2-upgrade-ant-jmfamazon-linux-ami-2-upgrade-ant-jschamazon-linux-ami-2-upgrade-ant-junitamazon-linux-ami-2-upgrade-ant-manualamazon-linux-ami-2-upgrade-ant-swingamazon-linux-ami-2-upgrade-ant-testutil
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.